SOC 2 reports follow a very specific and consistent structure, and Type 2 reports are broken down into 4 key elements.  The first of these elements is the auditor’s report, where the auditor details what they have done and their opinion of your system and service(s), i.e., whether it is a qualified or unqualified report.  The second element is an attestation letter from your organisation’s senior management, confirming that all the information provided during the audit is accurate, whilst the third is a description of your ‘system’.  The final element of the report is the auditor’s tests of the operational effectiveness of your controls.  

The third element of a SOC 2 report, the ‘system description’, is divided into two sections:

  • Company Background
  • Description of Services Provided
  • Principal Service Commitments and System Requirements
  • System Components
  • System Boundaries

The Control Environment

  • Control Environment
  • Risk Assessment Process
  • Information and Communications Systems
  • Monitoring Controls
  • System Changes Since Last Review
  • Incidents Since Last Review
  • Subservice Organisations
  • Complementary User Entity Controls.

These two sections reflect the two key aspects of the SOC 2 audit and report.  On the one hand, SOC 2 considers the detail of your information security processes and controls, and how your service(s) align with each of the selected TSC, which is covered by the Overview of Operations.   However, SOC 2 also looks at your organisation more broadly, which is reflected in the Control Environment section.  

From beginning to end URM made achieving PCI compliance incredibly easy & worked with us to educate us on the requirements. They were always available for a call whenever we needed to discuss queries along the way & were always flexible to our internal deadlines. We would highly recommend URM from a consultancy & auditing perspective.
Prize competition business
Contact SOC 2 Experts Today

Preparing for a Successful SOC 2 Audit

Published on
17 Oct
2025

URM’s blog offers key advice on what to expect from your SOC 2 audit in practice, the types of evidence you will need to provide, how best to prepare, and more.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
29/8/2025
SOC 2 Explained

URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.

Read more
"
It’s one thing having the required technical knowledge, it’s another thing for a consultant to apply that knowledge to the context of our organisation. To use a sporting analogy, we view cyber and information security as a marathon not a sprint. I am not a believer in doing everything all at once. Our approach has been risk based and incremental, remediating our biggest risks first before moving on. I believe this approach is far more sustainable and effective. And URM’s consultants fully understand this and are very pragmatic and tailored in their guidance and advice. They know we are not implementing ISO 27001 purely for the certificate, but more as a framework for continual improvement, and at a pace where new systems and processes can be fully understood and absorbed by our team and be business as usual.
The Owners and Distributors of Quality Brands
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.